Bot armies as threats to network security

被引:0
|
作者
Banks, Sheila B. [1 ]
Stytz, Martin R. [2 ]
机构
[1] Calculated Insight, Orlando, FL 32828 USA
[2] Inst Def Anal, Washington, DC USA
关键词
botnet; bot army; botherder; malware; information assurance; virus; worm; trojan;
D O I
10.1117/12.724246
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Botnets, or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [31] Enhancing Network Security Strategies against External Threats to Civil Aircrafts
    Cao Quanxin
    Yan Linfang
    Chen Bin
    Fan Chenchen
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 110 - 115
  • [32] Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
    M Indra Sena Reddy
    K Subba Reddy
    P J Bhatt
    Rajeev Chetwani
    Journal of Electronic Science and Technology, 2012, 10 (03) : 215 - 219
  • [33] Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
    M. Indra Sena Reddy
    K. Subba Reddy
    P. J. Bhatt
    Rajeev Chetwani
    Journal of Electronic Science and Technology, 2012, (03) : 215 - 219
  • [34] Detecting security threats in the network core using Data Mining techniques
    Sandford, P. J.
    Parish, D. J.
    Sandford, J. M.
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 951 - 954
  • [35] Assessment of Security Threats via Network Topology Analysis: An Initial Investigation
    Trovati, Marcello
    Thomas, Win
    Sun, Quanbin
    Kontonatsios, Georgios
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 416 - 425
  • [36] Soft Security Threats and European Security
    Watanabe, Lisa
    JOURNAL OF CONTEMPORARY EUROPEAN STUDIES, 2006, 14 (02) : 273 - 275
  • [37] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [38] The threats to food security
    Korneiko, Olga V.
    Rogaleva, Nadezhda L.
    AMAZONIA INVESTIGA, 2018, 7 (16): : 232 - 242
  • [39] TOP SECURITY THREATS
    KAY, R
    BYTE, 1995, 20 (04): : 94 - 94
  • [40] Countering security threats
    Rhodes, Ella
    PSYCHOLOGIST, 2016, 29 (01) : 14 - 14